<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Nelson Lopes]]></title><description><![CDATA[IT Director at a European SME. Each week I write about running IT with small budgets, small teams, and real trade-offs. CISSP · CEH · PMP · ITIL]]></description><link>https://newsletter.nelsonlopes.net</link><image><url>https://substackcdn.com/image/fetch/$s_!YP7w!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e24aae-918f-4d65-8d0e-154c124c0891_800x800.png</url><title>Nelson Lopes</title><link>https://newsletter.nelsonlopes.net</link></image><generator>Substack</generator><lastBuildDate>Mon, 27 Apr 2026 12:28:59 GMT</lastBuildDate><atom:link href="https://newsletter.nelsonlopes.net/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Nelson Lopes]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[lopesnelson@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[lopesnelson@substack.com]]></itunes:email><itunes:name><![CDATA[Nelson Lopes]]></itunes:name></itunes:owner><itunes:author><![CDATA[Nelson Lopes]]></itunes:author><googleplay:owner><![CDATA[lopesnelson@substack.com]]></googleplay:owner><googleplay:email><![CDATA[lopesnelson@substack.com]]></googleplay:email><googleplay:author><![CDATA[Nelson Lopes]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Hidden Cost of the AI Boom]]></title><description><![CDATA[From delayed proposals to rising hardware prices: how chip manufacturers' focus on AI Datacenters is reshaping IT procurement]]></description><link>https://newsletter.nelsonlopes.net/p/the-hidden-cost-of-the-ai-boom</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/the-hidden-cost-of-the-ai-boom</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Tue, 16 Dec 2025 09:01:50 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today I was informed by a supplier that the market is undergoing significant changes that may lead to delays in price approvals and supply, as well as increased technology costs.</p><p>What he says is that chip manufacturers, such as Nvidia and others, are prioritizing the supply of chips to Artificial Intelligence Datacenters, at the expense of other supplies, such as computers, multifunction printers, and other devices.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="6028" height="4012" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4012,&quot;width&quot;:6028,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Person holding computer cell processor&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Person holding computer cell processor" title="Person holding computer cell processor" srcset="https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1494083306499-e22e4a457632?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxtaWNyb2NoaXBzfGVufDB8fHx8MTc2NTYzNTAzMXww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@briankost">Brian Kostiuk</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>According to him, it is expected that this situation will continue throughout <strong>2026 and 2027</strong>, and that it will <strong>only normalize in 2028</strong>.</p><p>Which will, in every respect, be similar to what was experienced during the pandemic.</p><h2>What happened during the pandemic?</h2><p>During the Covid-19 pandemic, there were several delays. Some companies, due to a shortage of computers, had to provide computers with i3 processors to administrators - something that would normally be unthinkable, but had to be done, as the alternative was having no computers at all.</p><p>I recall that at <a href="https://www.expressglass.pt">ExpressGlass</a>, it was during this phase that, for some time, we stopped purchasing from our usual suppliers and started getting computers from retail stores - basically anywhere we could find them - deviating from our usual and more professional models. This was how we resolved the situation. When stock was available, it was picked up immediately and the issue was resolved.</p><p>We felt the impact on computers, but the most concerning issue was with the toners for the Xerox multifunction printers.</p><p>Those were very worrying times because we still didn&#8217;t have electronic invoicing, so shipments from <a href="https://www.axial.pt">DiverAxial</a> were required to go out with an invoice.</p><p>It was illegal for the carriers to make deliveries without the invoices, even if they had already been issued in the system. The carriers themselves wouldn&#8217;t even accept doing it. If they were stopped by the authorities and didn&#8217;t have the invoice, a fine would be imposed.</p><p>This put the entire operation and business of ExpressGlass at risk, since DiverAxial is its main supplier.</p><p>Therefore, at the time, it was necessary to source toners from various places. Coordinating all of this was not easy. We filed complaints and requested stock, but there simply wasn&#8217;t any. During this phase, the truth is that we faced significant risks.</p><h2>Reality or speculation?</h2><p>It is still being determined whether this will become a reality or if it is mere speculation. But the fact is that several delays are already occurring, particularly in the approval of prices and proposals.</p><p>The supplier even shared that they have already experienced a 70% increase, and since they have a supply contract, they are actually being heavily penalized.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The 3 Essential Steps Before Starting to Resolve Incidents]]></title><description><![CDATA[Turn Chaos into Structured and Predictable Incident Management]]></description><link>https://newsletter.nelsonlopes.net/p/the-3-essential-steps-before-starting-to-resolve-incidents</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/the-3-essential-steps-before-starting-to-resolve-incidents</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Tue, 18 Nov 2025 13:02:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Y-Rq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If managing incidents on its own can be stressful, imagine doing it without any organization. </p><p>Depending on the volume of incoming requests and their severity, chaos can quickly take over. From having no visibility into the number of requests hitting the incident response teams, to being unaware of the biggest problem hotspots, or even having technicians resolving non-urgent, low-impact issues while critical ones sit in the queue.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Follow these steps to make your day-to-day operations smoother.</p><h2>Steps in Incident Management</h2><p>There are <strong>three essential minimum steps</strong> for proper incident management.</p><h3>Step 1: Log the Incident</h3><p>The first step every technician must be instructed on is that <strong>an incident does not exist unless it is logged</strong>. For that, the ideal scenario is to have a ticketing platform that users are familiar with - everyone should receive training on it when it is implemented, and it should also be part of the onboarding training plan for new employees.</p><p>I won&#8217;t go into the topic of who should open the ticket, but in case you define it should be the user, be careful with agents who kindly open tickets on behalf of users - these cases are easy to notice in day-to-day operations, but the manager should regularly review the platform&#8217;s statistics to understand the scale of the problem. These &#8220;kind gestures&#8221; can undermine years of user education aimed at getting them to open tickets instead of approaching technicians directly.</p><p>If users have other communication channels to reach technicians and can initiate incident reporting that way, I still maintain that the incident must be logged - therefore someone has to create the ticket. In this case, it should be the technicians. The biggest challenge is getting technicians to create the ticket before starting the analysis and resolving the issue, so they don&#8217;t forget or get lazy to do it later.</p><p>In both scenarios, in less mature teams, it is common to see numerous issues solved without a ticket. This means that at the end of the day (or at the end of the month or year in accumulation), the statistics will not reflect the actual number of incidents that occurred, the real Mean Time to Resolve (MTTR), the number of incidents by category, nor the hours the team truly dedicated to this area.</p><h3>Step 2: Categorize the Incident</h3><p>Once logged, the incident must be categorized. Categorization helps assign the incident to the appropriate support team and also allows reporting to show which categories are becoming the most problematic.</p><p>Creating categories in a support tool is something that should be carefully considered and, like everything else, should evolve over time. What I mean by this is that it&#8217;s normal to have doubts about the structure you&#8217;re going to implement - whether it should have two levels (category and subcategory) or three (category, subcategory, and item), whether it should be specific enough to include modules within a particular application, or kept more generic.</p><p>There is no single &#8220;correct&#8221; way to implement categories. Each organization should think about what works best for them. However, based on my experience, the trend has been to simplify - meaning simplify both for users and for technicians. But only by analyzing the data can you properly assess whether this simplification limits management&#8217;s ability to understand where most problems are occurring, or where the most critical issues for the organization lie, and where time should be invested to address them.</p><h3>Step 3: Prioritize the Incident</h3><p>Once the incident is categorized, its priority must be defined among all the other unresolved tickets.</p><p>The priority of a ticket is determined by impact vs. urgency. This means there should be a scale for impact, another for urgency, and a matrix that clearly indicates the priority based on these two variables.</p><p>Personally, I like using the matrix provided by <a href="https://affiliatepartner-freshservice.freshworks.com/incident-management">Freshservice</a> (this is an affiliate link - if you sign up, I may earn a small commission at no additional cost to you):</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y-Rq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 424w, https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 848w, https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 1272w, https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png" width="815" height="302" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/afd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:302,&quot;width&quot;:815,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:26660,&quot;alt&quot;:&quot;Freshservice default priority matrix&quot;,&quot;title&quot;:&quot;Uma matriz de prioridade, atrav&#233;s do impacto versus urg&#234;ncia&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Freshservice default priority matrix" title="Uma matriz de prioridade, atrav&#233;s do impacto versus urg&#234;ncia" srcset="https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 424w, https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 848w, https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 1272w, https://substackcdn.com/image/fetch/$s_!Y-Rq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fafd41c04-1191-4bf7-9a26-b8cd9abab834_815x302.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Freshservice&#8217;s default priority matrix</figcaption></figure></div><p>On the X-axis we have urgency, and on the Y-axis we have impact. By classifying both, we obtain the priority that should be assigned to the ticket.</p><p>Of course, even after defining the priority, it may still match the priority of other incidents awaiting resolution. That&#8217;s where experience and business knowledge come into play.</p><p>Technicians with more years in the organization will intuitively know which tickets should take precedence - it will vary from case to case, but having alignment with leadership is ideal.</p><p>Less experienced technicians should rely on their colleagues or, ideally, their manager to understand which issues they should tackle first.</p><h2>Conclusion</h2><p>Incident Management only works when the fundamentals are in place: every incident must be logged, properly categorized, and prioritized based on impact and urgency. These practices may seem simple, but they form the backbone of an efficient and mature support organization.</p><p>By applying these three steps consistently, teams gain clearer visibility of their workload, reduce resolution times, improve communication with users, and build a reliable dataset to support better decision-making.</p><p>Improving Incident Management is a continuous journey - not a one-time project. Start with the basics, adapt the process to your organization, and refine it over time. Small improvements, applied consistently, lead to meaningful long-term results.</p><p>If you already follow these practices or have additional recommendations, feel free to share your experience in the comments.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Stop your devices from listening: why microphone blockers matter]]></title><description><![CDATA[Even when you think your gadgets are silent, they might still be listening. Here&#8217;s how a simple plug can protect your privacy.]]></description><link>https://newsletter.nelsonlopes.net/p/stop-your-devices-from-listening-why-microphone-blockers-matter</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/stop-your-devices-from-listening-why-microphone-blockers-matter</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Fri, 10 Oct 2025 20:56:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yCCB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If, like me, you dislike being listened to without your consent or awareness, then this article is for you. Learn why you should use microphone blockers.</p><p>Imagine being in the comfort of your home, having conversations with your partner, children, and other family members, while someone is remotely listening in through your devices.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>It&#8217;s not a very pleasant situation, is it? I don&#8217;t think anyone would like that.</p><p>That&#8217;s why it&#8217;s important to take precautions to ensure that these types of situations don&#8217;t happen.</p><p>Typically, operating systems aim to protect their users from such attacks. However, the best protection always lies in combining software controls with hardware controls, meaning&#8230;</p><ul><li><p>Keeping the operating system and applications up to date;</p></li><li><p>Regularly reviewing application permissions;</p></li><li><p>Having an antivirus installed and kept up to date.</p></li></ul><p>All of this helps protect against such threats, but it doesn&#8217;t guarantee that it won&#8217;t happen.</p><p>Therefore, the ideal solution is to use a microphone blocker, which will route the audio from your device to the blocker itself and receive audio back from it. In other words, your device will think a headset, for example, has been plugged in, so the device&#8217;s microphone is disabled, and the supposed microphone from the adapter is activated. However, this adapter does not have a built-in microphone, so it does not send any audio back to your device. This way, everything the other side hears, if someone is listening, is silence.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yCCB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yCCB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yCCB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yCCB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yCCB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yCCB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg" width="1200" height="1200" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1200,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A microphone blocker inserted into a laptop&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A microphone blocker inserted into a laptop" title="A microphone blocker inserted into a laptop" srcset="https://substackcdn.com/image/fetch/$s_!yCCB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yCCB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yCCB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yCCB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21d4846f-12bb-44f9-b1a5-6375317c0473_1200x1200.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A microphone blocker by Mic-Lock</figcaption></figure></div><p>I recommend the microphone blockers from <a href="https://mic-lock.com">Mic-Lock</a>. I personally use them on both my computer and smartphone, and they work very well.</p><p>You can test it by using a recording app to record an audio clip without the adapter and then with the adapter. When you listen to the recording later, you&#8217;ll notice that from the moment the adapter is inserted, no sound is recorded. The app continues recording, but there&#8217;s no audio input, which is exactly what we want.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[October is Cybersecurity Awareness Month]]></title><description><![CDATA[Since 2004, October has been recognized as Cybersecurity Awareness Month. This month was declared by the then President of the United States and Congress with the goal of having the public and private sectors work together to raise awareness about the importance of cybersecurity.]]></description><link>https://newsletter.nelsonlopes.net/p/october-is-cybersecurity-awareness-month</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/october-is-cybersecurity-awareness-month</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Wed, 01 Oct 2025 19:42:34 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>History and Origins of Cybersecurity Month</h3><h4>United States of America</h4><p>Since 2004, October has been recognized as <a href="https://www.cisa.gov/cybersecurity-awareness-month">Cybersecurity Awareness Month</a>. This month was declared by the then President of the United States and Congress with the goal of having the public and private sectors work together to raise awareness about the importance of cybersecurity.</p><p>This initiative has gained importance over the years, with efforts between government and industry to reduce online risks and generate discussion about cyber threats on a national scale in the United States, as well as globally.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In 2023, the <a href="https://www.cisa.gov">Cybersecurity &amp; Infrastructure Security Agency (CISA)</a> launched its awareness program called <a href="https://www.cisa.gov/secure-our-world">Secure Our World</a>, which recognizes the importance of taking daily actions to reduce online risks and the risks of using connected devices. It also enables organizations to use this theme when preparing for Cybersecurity Awareness Month, that is, when preparing their own awareness campaigns.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="7952" height="5304" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:5304,&quot;width&quot;:7952,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;red padlock on black computer keyboard&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="red padlock on black computer keyboard" title="red padlock on black computer keyboard" srcset="https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1614064642261-3ccbfafa481b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxjeWJlcnNlY3VyaXR5JTIwbW9udGh8ZW58MHx8fHwxNzU5MzQ2ODYzfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@flyd2069">FlyD</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h4>Europe</h4><p>On the European side, <a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/european-cybersecurity-month">European Cybersecurity Month</a> is the European Union (EU) campaign dedicated to promoting cybersecurity among European citizens and organizations, as well as providing updated information related to online security and sharing best practices.</p><p>Every year, throughout the entire month of October, hundreds of activities take place across Europe, including conferences, workshops, training sessions, webinars, presentations, and more, aimed at promoting digital security and cybersecurity hygiene.</p><p>This initiative is coordinated by the <a href="https://www.enisa.europa.eu">European Union Agency for Cybersecurity (ENISA)</a> and the European Commission, and is supported by each Member State and hundreds of government partners, including universities, think tanks, Non-Governmental Organizations (NGOs), professional associations, and the private sector in Europe and beyond.</p><p>Since the first event in 2012, European Cybersecurity Month has been promoted under the slogan &#8220;Cybersecurity is a Shared Responsibility&#8221; and, in 2020, the motto &#8220;Think Before U Click!&#8221; was officially launched.</p><h3>And the rest of the year?</h3><p>Although October is considered Cybersecurity Awareness Month, we must not forget that cybersecurity is something we should be concerned about every other month. I would go further: daily, throughout the entire year.</p><p>These are government initiatives, both in the United States and Europe, aimed at creating a period, at least once a year, during which various initiatives are held to raise cybersecurity awareness. However, all individuals and businesses should be aware that it&#8217;s not just during this month that they should focus on and invest in cybersecurity, but throughout the entire year.</p><p>Attacks do not happen only in October, but throughout the entire year. Therefore, it is important that people progressively protect themselves more over the year and across the years, implementing more controls that ensure their networks, devices, and accounts are progressively more secure.</p><h3>Companies, schools, and other organizations</h3><p>This can be an opportunity for companies, schools, and other organizations to join this initiative and also use the month of October to promote cybersecurity. This doesn&#8217;t require a great effort, as much of the material already exists and there can simply be a sharing plan in place.</p><p>This doesn&#8217;t mean that throughout the rest of the year there isn&#8217;t a need to continue raising awareness on this topic, but the month of October can be used for greater dissemination by entities, taking advantage of all the support provided by governments and other organizations for online promotion. This also allows for sharing various best practices, information about attacks, and how to protect oneself.</p><h3>How to learn more</h3><p>Anyone interested in following this topic more closely and learning more can visit the following websites:</p><ul><li><p><a href="https://www.cisa.gov/cybersecurity-awareness-month">Cybersecurity Awareness Month</a> by CISA;</p></li><li><p><a href="https://www.cisa.gov/secure-our-world">Secure Our World</a>;</p></li><li><p><a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/european-cybersecurity-month">European Cybersecurity Month</a> by ENISA;</p></li><li><p><a href="https://cybersecuritymonth.eu/">ECSM &#8211; European CyberSecurity Month</a>.</p></li></ul><p>In addition to these websites related to Cybersecurity Month, there is a vast array of other content you can follow, including forums, books, courses, newsletters like this one, among many others.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[LinkedIn is now feeding Microsoft's AI with your data]]></title><description><![CDATA[You have until November 3rd to opt out - consent is on by default.]]></description><link>https://newsletter.nelsonlopes.net/p/linkedin-is-now-feeding-microsofts-ai</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/linkedin-is-now-feeding-microsofts-ai</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Wed, 24 Sep 2025 22:26:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EJGR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s not exactly surprising - many platforms have already done it - but now LinkedIn will also start using your data to train Microsoft&#8217;s AI. <strong>By default, consent is turned on</strong>, and <strong>you have until November 3rd to switch it off</strong> if you don&#8217;t agree.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EJGR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EJGR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 424w, https://substackcdn.com/image/fetch/$s_!EJGR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 848w, https://substackcdn.com/image/fetch/$s_!EJGR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 1272w, https://substackcdn.com/image/fetch/$s_!EJGR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EJGR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png" width="1456" height="390" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:390,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:131744,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://lopesnelson.substack.com/i/174370927?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EJGR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 424w, https://substackcdn.com/image/fetch/$s_!EJGR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 848w, https://substackcdn.com/image/fetch/$s_!EJGR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 1272w, https://substackcdn.com/image/fetch/$s_!EJGR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F97f280ca-b6dc-4e14-9b31-430ada3f660f_1478x396.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">LinkedIn update to Terms and data use</figcaption></figure></div><h3>LinkedIn update to Terms and Data Use</h3><p>Funny enough, just last weekend I was reviewing my LinkedIn settings (for no particular reason - I&#8217;ve been less active there lately and more on other platforms). To my surprise, I came across those options and immediately turned them off, wondering how I had missed this before. A few days later, I started seeing posts from others pointing out that LinkedIn was indeed updating its Terms and data use to reflect these changes.</p><p>&#128073; If you also want to opt out, go to:</p><p>Settings &gt; Data Privacy &gt; Data for Generic AI Improvement &gt; Use my data for training content creation AI models (turn it off).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why you need to activate Multi-Factor Authentication (MFA) immediately ]]></title><description><![CDATA[MFA helps protect your online accounts]]></description><link>https://newsletter.nelsonlopes.net/p/why-you-need-to-activate-multi-factor</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/why-you-need-to-activate-multi-factor</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Fri, 12 Sep 2025 22:02:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WZSg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We can think of <strong>Multi-Factor Authentication (MFA)</strong> as one or more additional steps required when authenticating against a system, after entering the first factor (e.g., after entering the username and password), and before being granted access to the system.</p><p>Referring to online accounts, imagine that somehow your credentials were compromised - that is, someone managed to discover them. If you don't have MFA enabled, the attacker will be able to access your account without any difficulty. However, with MFA active, after entering the username-password combination, the attacker will be confronted with a second authentication step using a different factor.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The goal is for only the user, the true account holder, to have access to the additional factor(s) required to access the system in question. This way, in a situation like this, the account will be protected, as it will be much harder for the attacker to bypass these other factors. However, bear in mind that harder does not mean impossible.</p><h2>Authentication factors</h2><p>There are three primary authentication factors. They are:</p><ul><li><p><strong>Something you know</strong>, which can be a password, a passphrase, a PIN, the answer to security questions, etc.</p></li><li><p><strong>Something you have</strong>, which refers to physical devices in the user's possession that can help with authentication, such as a mobile phone, a smart card, a hardware token, a memory card, a USB drive, etc.</p></li><li><p><strong>Something you are</strong>, which refers to physical characteristics of a person, such as fingerprints, facial features, retina patterns, iris patterns, hand geometry, etc.</p></li></ul><p>In addition to the three primary factors, attributes such as the following can be added:</p><ul><li><p><strong>Where you are</strong>, based on a device, geographic location, a phone number, etc.</p></li><li><p><strong>Contextual authentication</strong>, where, for example, you can set working hours, not allowing access to the account outside of those hours. It can also include location and device type.</p></li><li><p><strong>Something you do</strong>, which can refer, for example, to gestures used on mobile devices to unlock them by connecting points (pattern), or image passwords, supported by Windows 10, where the user moves their fingers on the screen over an image.</p></li></ul><h2>Something you know</h2><p>This factor is also known as <strong>knowledge-based authentication</strong> or <strong>type 1 authentication factor</strong>.</p><p>It means that the user provides something they know to authenticate themselves to a system.</p><p>In the case of passwords, they can be simple or complex, where:</p><ul><li><p>Incorrectly, people tend to use simple passwords, often related to personal information, because they are easier to remember. When this happens, passwords are easily guessed.</p></li><li><p>When using complex passwords, people often end up writing them down somewhere, whether on post-it notes stuck to the monitor, in a notebook, or even in a text file on their computer&#8217;s desktop. In these cases, the password becomes visible to others, or even if it is not in plain sight, it can be found relatively easily.</p></li></ul><p>The solution to these problems lies in Password Managers, which organize your credentials, store them securely, and, best of all, you only need to remember one password - the master password, which is used to log in to the Password Manager. This master password should be long (at least 14 characters) and, to make it easier, you can create a passphrase.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WZSg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WZSg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WZSg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WZSg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WZSg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WZSg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg" width="1024" height="661" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:661,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;No Multifator de Autentica&#231;&#227;o, as passwords fazem parte do fator algo que sabe&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="No Multifator de Autentica&#231;&#227;o, as passwords fazem parte do fator algo que sabe" title="No Multifator de Autentica&#231;&#227;o, as passwords fazem parte do fator algo que sabe" srcset="https://substackcdn.com/image/fetch/$s_!WZSg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WZSg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WZSg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WZSg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d7560db-84f8-423a-b8d2-f9ae80df632e_1024x661.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">In Multi-Factor Authentication, passwords are part of the <strong>something you know</strong> factor. Credit: <a href="https://pixabay.com/users/mohamed_hassan-5229782/">Mohamed_hassan via Pixabay</a></figcaption></figure></div><p>Passphrases are passwords based on phrases, making them easier to remember, and they address the complexity issue, especially when mixed with uppercase and lowercase letters, numbers, and special characters.</p><p>Regarding security questions, their security also increases if the user uses complex strings instead of the actual answer to the questions. The true answers are often so obvious to those who know the user even slightly (and with all the information shared on social media these days, this can be relatively easy), making them easy to compromise.</p><h2>Something you have</h2><p>This factor is also known as <strong>possession-based authentication</strong> or <strong>type 2 authentication factor</strong>.</p><p>Perhaps the most common method is One-Time Passwords (OTP), which, as the name suggests, are codes that can only be used once and expire if not used within a certain period of time. They can be generated via:</p><ul><li><p><strong>Software (soft tokens)</strong>, such as the popular Authenticator apps like <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2">Google Authenticator</a>, <a href="https://play.google.com/store/apps/details?id=com.azure.authenticator">Microsoft Authenticator</a>, <a href="https://duo.com/">Cisco DUO</a>, etc.</p></li><li><p><strong>Hardware (hard tokens)</strong>, which are dedicated hardware devices, such as the <a href="https://www.rsa.com/products/securid/">RSA SecurID</a>.</p></li></ul><p>In addition to the type of device where they are generated, OTPs can be:</p><ul><li><p><strong>Synchronous OTP</strong>, which is the most common and least complex. It can be time-based or counter-based. Time-based OTPs are generated every 30 or 60 seconds, while counter-based OTPs increment a number with each use.</p></li><li><p><strong>Asynchronous OTP</strong>, which, although less common and more complex, provides a more robust layer of security.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xP_H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xP_H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 424w, https://substackcdn.com/image/fetch/$s_!xP_H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 848w, https://substackcdn.com/image/fetch/$s_!xP_H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 1272w, https://substackcdn.com/image/fetch/$s_!xP_H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xP_H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif" width="1024" height="683" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:683,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;No Multifator de Autentica&#231;&#227;o, as security keys pertencem ao fator algo que tem&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="No Multifator de Autentica&#231;&#227;o, as security keys pertencem ao fator algo que tem" title="No Multifator de Autentica&#231;&#227;o, as security keys pertencem ao fator algo que tem" srcset="https://substackcdn.com/image/fetch/$s_!xP_H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 424w, https://substackcdn.com/image/fetch/$s_!xP_H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 848w, https://substackcdn.com/image/fetch/$s_!xP_H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 1272w, https://substackcdn.com/image/fetch/$s_!xP_H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f255823-2e90-4cbb-a7bc-beb5015ed153_1024x683.avif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">In Multi-Factor Authentication, security keys belong to the <strong>something you have</strong> factor. Credit: <a href="https://www.pexels.com/@cottonbro/">Cottonbro Studio via Pexels</a></figcaption></figure></div><p>Smart cards, on the other hand, are so named because they contain an embedded integrated circuit that can perform calculations and generate unique authentication data for each transaction. They can be:</p><ul><li><p><strong>Contact Smart Cards</strong>, where the chip on the card needs to make contact with the reader to receive power and allow the transaction to be completed.</p></li><li><p><strong>Contactless Smart Cards</strong>, where the reader sends signals that are strong enough to power the chips and communicate with them, allowing the card to perform the necessary calculations and respond to the reader.</p></li></ul><p>Memory cards contain a type of memory that is embedded in a magnetic strip, usually on the back of the card, from which the same data is read during each transaction.</p><h2>Something you are</h2><p>Also known as <strong>biometric authentication</strong> or <strong>type 3 authentication factor</strong>.</p><p>It is divided into:</p><ul><li><p><strong>Physiological characteristics</strong>, which can include fingerprints, hand geometry, facial features, eye characteristics (such as iris and retina), etc.</p></li><li><p><strong>Behavioral characteristics</strong>, which can include how a person writes, walks, speaks, presses the keys on a keyboard, etc.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!quFO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!quFO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 424w, https://substackcdn.com/image/fetch/$s_!quFO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 848w, https://substackcdn.com/image/fetch/$s_!quFO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 1272w, https://substackcdn.com/image/fetch/$s_!quFO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!quFO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif" width="1024" height="684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:684,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;No Multifator de Autentica&#231;&#227;o, os leitores de impress&#245;es digitais pertencem ao fator algo que &#233;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="No Multifator de Autentica&#231;&#227;o, os leitores de impress&#245;es digitais pertencem ao fator algo que &#233;" title="No Multifator de Autentica&#231;&#227;o, os leitores de impress&#245;es digitais pertencem ao fator algo que &#233;" srcset="https://substackcdn.com/image/fetch/$s_!quFO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 424w, https://substackcdn.com/image/fetch/$s_!quFO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 848w, https://substackcdn.com/image/fetch/$s_!quFO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 1272w, https://substackcdn.com/image/fetch/$s_!quFO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea9978d3-7ba0-4cf9-8215-244d24d5628f_1024x684.avif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">In Multi-Factor Authentication, fingerprint readers belong to the <strong>something you are</strong> factor. Credit: <a href="https://www.pexels.com/@cookiecutter/">Panumas Nikhomkhai via Pexels</a></figcaption></figure></div><h2>Where you are</h2><p>Location can be obtained based on the IP address or through geolocation.</p><p>This type of system can prevent access by users who are not in the location where they typically connect - <strong>where you are not</strong>. In fact, a basic rule is that a user should not be able to log in to their account outside of their workplace, or, if they wish to do so, they must request permission. Although this control can be easily bypassed using a VPN, it still serves as a protection that makes sense.</p><h2>Single-Factor Authentication and Two-Factor Authentication</h2><p>There is some confusion regarding what is considered the use of authentication factors.</p><p>For example, if a system uses more than one type of authentication, but all are from the same factor, it is not Multi-Factor Authentication, but rather <strong>Single-Factor Authentication</strong>. Examples where, despite using different types of authentication, Multi-Factor Authentication does not occur:</p><ul><li><p>The use of username/password and the answer to security questions - both mechanisms belong to the <strong>something you know</strong> factor.</p></li><li><p>The use of a token generated by Google Authenticator and another generated by RSA SecurID - both mechanisms belong to the <strong>something you have</strong> factor.</p></li><li><p>The use of a fingerprint reader and a retina reader - both mechanisms belong to the <strong>something you are</strong> factor.</p></li></ul><p>The combination of two factors, such as something you know and something you have, can be called <strong>Two-Factor Authentication</strong>.</p><p>The difference between Two-Factor Authentication and Multi-Factor Authentication is that the former refers to the use of two factors, while the latter refers to the use of two or more factors.</p><p>It is important to note that using different types of authentication from the same factor typically does not add security, as the same type of attack can compromise them. In other words, using a password and a PIN does not guarantee that you are more secure than if you only used a password, as the same attacks that can be performed to discover the password can also discover the PIN. In contrast, when using different factors, such as a password and an OTP from a hard token, it would be necessary to both discover the password and physically steal the hard token in order to successfully access the account.</p><h2>Weak and Strong Multi-Factor Authentication</h2><p>Although Multi-Factor Authentication (MFA) is a recommended configuration, it does not guarantee by itself that your accounts are secure. For example, SMS-based Multi-Factor Authentication is considered weak due to an attack known as SIM Swap, in which criminals gain control of the victim's phone number, thus gaining access to the code sent to it, enabling them to log into the victim's accounts.</p><p>However, even when using strong authentication factors, there are some considerations to keep in mind:</p><ul><li><p>When using an Authenticator that sends notifications for the user to approve access, if the user is distracted or unaware of what they are doing, they may accidentally approve access for a third party without realizing what is actually happening.</p></li><li><p>When using an Authenticator that sends notifications, generates codes, or asks for a code provided on the website, although these methods are considered secure, the user can be deceived if they access a fake website that closely resembles the real one. In such cases, the data the user enters - such as their username and password - will be sent to the real site, followed by the OTP, allowing the attacker to gain unauthorized access.</p></li></ul><p>To address this, you could consider using passkeys or even security keys (physical security keys), as these devices must be physically connected to the device from which the login is being made, or brought near (via NFC), in order for access to be granted. This adds an additional layer of security by ensuring that the attacker cannot gain access without having the physical key or device.</p><h2>Does the second authentication factor always have to be requested?</h2><p>No, not always. For example, some services only ask for it the first time you use a particular device. After that, the device is authorized to access your account and is recognized as trusted, and by itself, functions as a factor. The second factor will only be requested when you access from a device that the service does not recognize.</p><p>There are also services that allow you to store the data for a certain period of time, not requesting the second authentication factor until that period expires.</p><h2>What if I lose the MFA method?</h2><p>You should always keep in mind alternatives to the MFA method you set up. For example, some services provide backup codes that can be used in case you lose access to the configured method. Make sure to note those codes down carefully. If you are using a security key as an authentication factor, like a <a href="https://www.yubico.com/">Yubikey</a>, it is a good practice to have a second security key in case you lose the first one. You might even consider storing the second key in a different physical location than the first.</p><h2>A word about FIDO2</h2><p>I can't finish this article without mentioning <a href="https://fidoalliance.org/fido2/">Fast IDentity Online 2 (FIDO2)</a>, although in a very brief way. FIDO2 is an open protocol for user authentication that uses passkeys, which are credentials created through public key cryptography, with a private key and a public key being created. The private key is securely stored on the user's device, and the public key is encrypted and sent to the service's server.</p><p>The key pair is used to authenticate the user directly on their device, whether it&#8217;s a computer, tablet, mobile phone, or security key. Whenever the user logs in, the service presents a unique challenge to the client. The device is activated via touch, fingerprint or face recognition, or PIN entry, allowing the request to be signed and returned. This makes the process cryptographically protected against phishing.</p><p>Since a different key pair is generated for each web application or website, they also have the advantage of enhancing user privacy by making it harder to link activity across services.</p><p>FIDO2 also implements the concept of Passwordless, which means that no passwords are used to log in. This makes access not only more convenient but also more secure, as the vulnerabilities associated with passwords are well known.</p><p>The first version, which introduced phishing-resistant Multifactor Authentication, was released in 2014, and the second, released in 2018, defined the standard for passwordless authentication.</p><h2>Conclusion</h2><p>In conclusion, despite all the information in this article, the main takeaway is the importance of enabling Multifactor Authentication on all your accounts that support it - this is usually something that can be done in your account settings.</p><p>Not all services use strong MFA, but even so, having MFA enabled - even if weak - is better than having none.</p><p>Conduct an audit of your accounts now to enable MFA on those where it&#8217;s not yet activated. It&#8217;s true that it will take some time, but in the end, you&#8217;ll feel more at ease about the security of your accounts and the information they contain.</p><p>Thinking that it only happens to others is not a good security strategy. It&#8217;s also important to keep in mind that there are various ways credentials can be compromised, whether through attacks targeting the user directly or the service where their credentials are stored. And we don&#8217;t always know how these services handle our data - in other words, there have been numerous leaks showing that some services still don&#8217;t follow best practices for storing their users&#8217; credentials!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Did you know you can connect a keyboard and mouse to your smartphone or tablet?]]></title><description><![CDATA[And to the TV box?]]></description><link>https://newsletter.nelsonlopes.net/p/did-you-know-you-can-connect-a-keyboard</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/did-you-know-you-can-connect-a-keyboard</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Tue, 09 Sep 2025 22:27:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PVX1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Your keyboard and mouse can be connected to your smartphone or tablet to improve the user experience of these devices.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PVX1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PVX1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PVX1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PVX1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PVX1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PVX1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg" width="1600" height="1036" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1036,&quot;width&quot;:1600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:495098,&quot;alt&quot;:&quot;A smartphone with a keyboard and a mouse connected&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nelsonlopesen.substack.com/i/173222842?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea773478-4271-4011-b58e-086f1c65713f_1600x1200.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A smartphone with a keyboard and a mouse connected" title="A smartphone with a keyboard and a mouse connected" srcset="https://substackcdn.com/image/fetch/$s_!PVX1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PVX1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PVX1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PVX1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffcaf7e22-b31a-4c69-be96-e5d1f88e41b6_1600x1036.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A smartphone with a keyboard and a mouse connected</figcaption></figure></div><p>I don&#8217;t know if this is the case for everyone, but I type faster on a physical keyboard than on a virtual one like those on mobile devices. So, for longer texts or extended conversations, using a physical keyboard can be quite useful.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Nelson Lopes [EN]! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The same goes for the mouse, which can be used in various applications, including games.</p><p>For this to be possible, you may need a USB-A to USB-C adapter.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qZkQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qZkQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qZkQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qZkQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qZkQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qZkQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg" width="1456" height="1089" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1089,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1527590,&quot;alt&quot;:&quot;A USB-A to USB-C adapter&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nelsonlopespt.substack.com/i/173219627?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A USB-A to USB-C adapter" title="A USB-A to USB-C adapter" srcset="https://substackcdn.com/image/fetch/$s_!qZkQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qZkQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qZkQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qZkQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c89425d-078f-405b-89bf-b84addbb9a98_4640x3472.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A USB-A to USB-C adapter</figcaption></figure></div><p>To further improve the experience, you can place the device on a dedicated stand in front of you, either horizontally or vertically, so the screen faces you without having to hold it in your hand or lay it flat on the table.</p><p>In addition to mobile devices, they can also be connected to your TV box. This makes its use much easier, since, for example, searching on YouTube with the box&#8217;s remote is&#8230; time-consuming!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QbeL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QbeL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QbeL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QbeL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QbeL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QbeL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg" width="1456" height="1089" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1089,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1110777,&quot;alt&quot;:&quot;Using a physical keyboard to search YouTube on a TV box&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nelsonlopesen.substack.com/i/173222842?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Using a physical keyboard to search YouTube on a TV box" title="Using a physical keyboard to search YouTube on a TV box" srcset="https://substackcdn.com/image/fetch/$s_!QbeL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 424w, https://substackcdn.com/image/fetch/$s_!QbeL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 848w, https://substackcdn.com/image/fetch/$s_!QbeL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!QbeL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F936f3c9e-7d40-4237-a5c2-144d291f27dd_4640x3472.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Using a physical keyboard to search YouTube on a TV box</figcaption></figure></div><p>Did you already know about this? Have you ever connected a keyboard and/or mouse to mobile devices or TV boxes? What was the purpose? Share your experience in the comments.</p><p>See you soon,</p><p>Nelson Lopes</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Nelson Lopes [EN]! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Slow network and it’s Tuesday?]]></title><description><![CDATA[And is it specifically the second Tuesday of the month?]]></description><link>https://newsletter.nelsonlopes.net/p/slow-network-and-its-tuesday</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/slow-network-and-its-tuesday</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Tue, 12 Aug 2025 08:01:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0dzk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s called <strong>Patch Tuesday</strong>, and it&#8217;s the day Microsoft releases updates for its products. Depending on the size of your device fleet and the bandwidth available, you might notice some network slowness on these days - especially if there&#8217;s no structured update management policy in place.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0dzk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0dzk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0dzk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0dzk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0dzk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0dzk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2240459,&quot;alt&quot;:&quot;A woman waiting for the computer to unblock.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://lopesnelson.substack.com/i/170075670?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A woman waiting for the computer to unblock." title="A woman waiting for the computer to unblock." srcset="https://substackcdn.com/image/fetch/$s_!0dzk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0dzk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0dzk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0dzk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F421ef434-12d5-47ef-a273-a030c4292349_6000x4000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Waiting is hard.</figcaption></figure></div><p>On this day, Microsoft rolls out critical patches (including zero-days), security updates, cumulative updates, bug fixes, and performance/stability improvements.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Nelson Lopes [EN] is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In enterprise environments, don&#8217;t forget to manage updates carefully: test them on staging machines first, and only then roll them out to the rest of the organization. In fact, I recommend using a <strong>three-ring approach</strong>:</p><ul><li><p><strong>Ring 0</strong> &#8211; First machines and users to receive updates;</p></li><li><p><strong>Ring 1</strong> &#8211; Key machines/users representing different departments;</p></li><li><p><strong>Ring 2</strong> &#8211; The rest of the organization.</p></li></ul><p>This can be managed using solutions like Intune, WSUS, SCCM, or other remote management platforms (RMMs).</p><p>That said, patches that fix zero-days - vulnerabilities for which no official fix existed and that may already be exploited - should be applied as early as possible, regardless of which ring the device belongs to.</p><p>Also, keep in mind: if the second Tuesday of the month is a public holiday, it&#8217;s likely that many computers were off and didn&#8217;t receive the update - meaning the real slowdown will happen on Wednesday. Just saying&#8230; it has happened before. :)</p><p>Talk soon,</p><p><strong>Nelson</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Nelson Lopes [EN] is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The reason I use an RFID-blocking wallet]]></title><description><![CDATA[Did you know that a malicious person can easily steal your money by simply holding a payment terminal close to your pocket or wallet?]]></description><link>https://newsletter.nelsonlopes.net/p/the-reason-i-use-an-rfid-blocking</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/the-reason-i-use-an-rfid-blocking</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Tue, 05 Aug 2025 08:00:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BhFr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hello again :)</p><p>Nowadays, we increasingly have less need to carry a physical wallet. For example, in Portugal, the gov.id app (<a href="https://apps.apple.com/pt/app/gov-pt/id1384884826">iOS</a>, <a href="https://play.google.com/store/apps/details?id=id.gov.pt&amp;hl=pt">Android</a>) already allows users to legally present their citizen card, driver&#8217;s license, vehicle registration certificate, car insurance, among other documents, meaning there&#8217;s no longer a need to carry them physically.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Nelson Lopes is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>NFC technology, used in banking apps, has long allowed for contactless payments without physical cards. For instance, also in Portugal, the MBWay app enables payments not only via NFC but also through QR code scanning, which greatly simplifies the payment process and reduces - or even eliminates - the need to carry physical bank cards.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BhFr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BhFr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BhFr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BhFr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BhFr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BhFr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1191162,&quot;alt&quot;:&quot;A regular wallets, and completely unprotected from digital pickpockets.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://lopesnelson.substack.com/i/170022533?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A regular wallets, and completely unprotected from digital pickpockets." title="A regular wallets, and completely unprotected from digital pickpockets." srcset="https://substackcdn.com/image/fetch/$s_!BhFr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BhFr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BhFr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BhFr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4ef0da6-a03b-417c-ad9a-73c413cee669_5472x3648.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Regular wallets are completely unprotected from digital pickpockets.</figcaption></figure></div><p>Still, most people continue to carry their physical ID and bank cards - either because they&#8217;re not comfortable with the technology (they don&#8217;t know how it works or are afraid of making mistakes), don&#8217;t trust it yet, haven&#8217;t taken the time to test it, or simply don&#8217;t want to. A friend of mine once said he didn&#8217;t use MBWay because it drains his smartphone battery &#128558;</p><p>That said, it&#8217;s important to be aware that contactless cards don&#8217;t need to be inserted into a payment terminal to complete a transaction - just bringing them close is enough. This also means that a malicious person could approach your pocket or wallet with a payment device in a crowded street or public place and charge you without your consent.</p><p>PIN entry is only required for payments above a certain amount, so any charge below that limit will go through without issue.</p><p>The same risk exists if you keep NFC enabled on your smartphone and your banking apps are configured for payments. <strong>You should always disable NFC when you&#8217;re not using it</strong>.</p><p>Additionally, it&#8217;s important to know that access cards to private buildings can be cloned very easily using tools that are freely available online - like the <a href="https://flipperzero.one/">Flipper Zero</a>. Once a card is scanned, its data can be stored on the Flipper Zero and:</p><ul><li><p>Replayed by holding the Flipper Zero close to an access reader, unlocking a door, safe, garage, etc. that was originally restricted to the access card;</p></li><li><p>Or cloned onto a blank smart card, creating a duplicate of the original (which is much less suspicious than carrying around a Flipper Zero).</p></li></ul><p>Because of this, <strong>I strongly recommend using RFID-blocking wallets</strong> so that all cards inside are secure from these types of attacks. These wallets are available both online and in physical stores.</p><p><strong>Don&#8217;t forget to test your wallet</strong> to make sure the RFID-blocking actually works. To do this, try making a payment while your bank card is inside the wallet. If all goes well, nothing will happen - you&#8217;ll need to remove the card in order to complete the transaction.</p><p>If you don&#8217;t have one of these wallets yet, don&#8217;t wait. Get yours today!</p><p>Thanks, and see you soon,<br><strong>Nelson</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Nelson Lopes is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The beginning]]></title><description><![CDATA[As a computer enthusiast and Director of Information Systems, my daily work revolves around technology. Beyond managing teams and departments, I&#8217;m involved in various areas such as networks, cloud, systems administration, software engineering, ERP, RPA, VoIP, cybersecurity, and more.]]></description><link>https://newsletter.nelsonlopes.net/p/the-beginning</link><guid isPermaLink="false">https://newsletter.nelsonlopes.net/p/the-beginning</guid><dc:creator><![CDATA[Nelson Lopes]]></dc:creator><pubDate>Sun, 03 Aug 2025 15:48:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mTWO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Hello :)</strong></p><p>Welcome to my Substack.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mTWO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mTWO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mTWO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mTWO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mTWO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mTWO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg" width="1456" height="959" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:959,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:436493,&quot;alt&quot;:&quot;Every journey starts with a blank page - just like this Substack.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://lopesnelson.substack.com/i/170009323?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Every journey starts with a blank page - just like this Substack." title="Every journey starts with a blank page - just like this Substack." srcset="https://substackcdn.com/image/fetch/$s_!mTWO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mTWO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mTWO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mTWO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F767609e5-a98e-4598-84b0-e67bd6c7aedf_5184x3416.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Every journey starts with a blank page - just like this Substack.</figcaption></figure></div><p>In this first post, I&#8217;d like to welcome you and share a bit about what you can expect to find here.</p><p>As a computer enthusiast and Director of Information Systems, my daily work revolves around technology. Beyond managing teams and departments, I&#8217;m involved in various areas such as networks, cloud, systems administration, software engineering, ERP, RPA, VoIP, cybersecurity, and more.</p><p>Outside of work, I enjoy spending time with my family, reading, running, going to the beach, and - of course - exploring technology for personal curiosity.</p><p>I hold several certifications, including CISSP, ITIL, PMP, and C|EH. I&#8217;m also a member of the Portuguese Order of Engineers, PMI, PMI Portugal, among others.</p><p>I live in Porto, Portugal, and I&#8217;m the proud father of a little girl - and of <em>Biscoito</em> (Cookie), our family cat.</p><p>On this Substack, I&#8217;ll be sharing some of my experience, with a special focus on tech updates, cybersecurity, service management (ITSM), project management, productivity, and related topics.</p><p>If you want to know more about me, you can visit <a href="https://nelsonlopes.net/about">this</a> page.</p><p>Thanks for reading,<br><strong>Nelson</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.nelsonlopes.net/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>